Register for the course              The Names of Participants in the Course of Academic Promotion              Register for the course              The Names of Participants in the Course of Academic Promotion              Register for the course

Poll

What do you think the level of benefit from the university's website?

 Weak
 Good
 Very good

Total Votes 510

Professors

Center
Career Title
Name

Graduates

Center
Certificate
Year
Type
Sex
Name

Students

Center
Stage
Certificate
Type
Sex
Name

 News Details

Data Security Using Random Dynamic Salting and AES Based On Master-Slave Keys For Iraqi Dam Management System

2022-08-07

Data Security Using Random Dynamic Salting and AES Based On Master-Slave Keys For Iraqi Dam Management System


 Hussam J. Ali 1, Talib M. Jawad2, Hiba Zuhair3 

1 Informatics Institute for Postgraduate Studies, Iraqi Commission for Computers and Informatics, Baghdad, Iraq

2 College of Information Engineering, Al-Nahrain University, Baghdad, Iraq

hiba.zuhir@coie-nahrain.edu.iq

Nowadays, data security is one of the critical challenges of e-government in Iraq, as it needs IT infrastructure, data integrity, and user privacy protection against Internet threats that render this vital infrastructure ineffective. This paper deals with a multi-level secure model by encrypting and decrypting the data using the Advanced Encryption Standard (AES) algorithm with keys derived via PBKDF2 sequence generator, RNG, and a secondary key to protecting the random generator also to protect the main string. The empirical analysis of encryption/decryption process speed, plain text sensitivity, cipher text analysis, key space analysis, and histogram analysis was conducted. The results of the proposed model showed the level of obstruction of known attacks such as brute force attacks, statistical, and differential attacks. Thus, the encryption model can be implemented in information management systems and in the application of electronic governance, for example, dam data management systems.

Link....

 

 News More

 Color Image Encryption with a Key Generated by Using Magic Square

 The effect of network size and density to the choice of zone radius in ZRP

  ?Version/Source control (VSC)

 Evidence Identification in Heterogeneous Data Using Clustering

 An improved robust image watermarking scheme based on the singular value decomposition and genetic algorithm

 Solving Vehicle Routing Problem with Time Window Based on Quantum and Evolutionary Computing

 Learning How to Search: Generating Exception-Triggering Tests Through Adaptive Fitness Function Selection

 Willingness Impact to the PAR Optimisation of R-users Community using EMS

Share |